PODCAST · technology
The Privacy Report
by Omar Torres
Your source for digital privacy news, security tips, and reviews of tools that help you protect your data online.
-
81
What Is Cybersecurity Really Protecting?
Cybersecurity isn’t just about stopping hackers it’s about controlling who can access your data and why. This guide breaks down what it really means, why it matters now, and how to protect yourself effectively.
-
80
DNS Block Lists: Do They Actually Protect Your Privacy?
DNS block lists can reduce tracking and block malicious domains, but they’re not a complete privacy solution. Here’s what they actually protect, what they miss, and how to use them effectively in 2026.
-
79
Are Loyalty Programs Selling Your Data?
Loyalty programs promise savings, but often trade discounts for detailed personal data. Here’s how they track you, influence prices, and what you can do to protect your privacy.
-
78
Credit Freeze vs Credit Monitoring: What Actually Protects You?
A credit freeze is free and actually blocks fraud, while credit monitoring only alerts you after the fact. Here’s what most advice gets wrong and how to protect yourself properly. Read next:The Hidden Costs of “Free” VPNsFree Software: When You’re the ProductData Brokers vs Governments: Who Really Knows You Better?
-
77
The Risks of FinTech Screen Scraping
FinTech apps often connect to your bank using screen scraping, which may require sharing your login credentials. Here’s how the technology works, why it raises privacy concerns, and how to tell if an app is using it.
-
76
Identity theft online: what actually works in 2026?
Identity theft online rarely starts with a hack — it starts with weak account security and breached data. This practical guide explains what actually works today, where most advice fails, and how to reduce your risk without relying on expensive monitoring services.
-
75
“I Have Nothing to Hide” Is a Dangerous Myth
“I have nothing to hide” misses how modern surveillance really works. Privacy isn’t about secrets—it’s about power, autonomy, and protecting everyday people from profiling, manipulation, and future abuse.
-
74
Email Receipts Are Tracking You
Email receipts aren’t just proof of purchase. Many include hidden tracking that links your buying behavior to long-term profiles. This guide explains how receipt tracking works—and how to limit it without losing access.
-
73
KOSA and Age Verification: The Good, the Bad, and the Ugly
KOSA doesn’t mandate age verification—but it all but guarantees more data collection. This deep dive explains how S.1748 incentivizes surveillance, threatens anonymity, and why the real privacy risks aren’t in the fine print but in compliance behavior.
-
72
Apple’s Contact Key Verification: What It Actually Protects—and What It Doesn’t
Contact Key Verification adds a powerful tripwire against silent iMessage interception—but it doesn’t eliminate Apple’s control or metadata risks. Here’s what CKV actually protects, where it falls short, and who should use it.
-
71
Zero Trust Security: Trust Less, Protect More
Zero Trust is a modern security model that assumes no user or device should be trusted by default. Learn how it works, why it matters for privacy, and how to apply it responsibly.
-
70
CVEs Explained Simply
CVEs are public identifiers for known security vulnerabilities. This guide explains how CVEs work, why they matter for privacy and data protection, and how to use them to reduce real-world digital risk.
-
69
Understand Terms of Service Before You Click Accept
Terms of Service; Didn’t Read helps you understand what you’re really agreeing to before clicking “accept.” Learn how ToS;DR exposes hidden privacy risks, where it falls short, and how to use it to make better digital decisions.
-
68
Data Sovereignty Starts at Home
Governments are rethinking data sovereignty as reliance on foreign tech becomes risky. This guide explains what data sovereignty really means—and how individuals can apply the same principles to their own digital lives.
-
67
Education Is the Best Deterrent Against Cyber Attacks
Cybersecurity skills gaps—not headcount—are the biggest risk in 2025. New ISC2 research shows why education is the most effective deterrent against modern cyber attacks.
-
66
Mullvad Browser: A Practical Tool to Reduce Web Tracking and Profiling
Mullvad Browser is designed to stop tracking and profiling by making users blend in rather than stand out. This guide explains how it works, where it excels, and the mistakes that quietly undermine its privacy benefits.
-
65
What Is RCS Messaging—and Is It Actually Secure?
RCS messaging adds modern features to SMS, but its security is widely misunderstood. This guide explains when RCS is encrypted, who can see your messages, and why privacy-focused users should be cautious.
-
64
Immich: Private Photo Hosting Without Big Tech
Immich is an open-source, self-hosted alternative to Google Photos that keeps your images under your control. This guide explains how it works, why it matters for privacy, and what to consider before using it.
-
63
The Erosion of Privacy
Digital privacy is eroding through constant tracking, data brokers, and weak enforcement. Learn what’s driving the loss of privacy, how it affects real people, and what practical steps you can take to regain control.
-
62
Free Software: When You’re the Product
Free software often isn’t free—you pay with your data. Learn how ad-supported apps monetize users, the risks involved, and how to choose privacy-respecting alternatives.
-
61
End-to-End Encryption Explained
End-to-end encryption keeps messages readable only by you and the person you’re talking to. Learn how it works, what it protects, where it falls short, and how to choose tools that truly respect your digital privacy.
-
60
Surveillance Pricing Explained
Surveillance pricing uses personal data to charge different people different prices. This guide explains how it works, why it threatens privacy, and what consumers can do about it.
-
59
uBlock Origin for Privacy
uBlock Origin is a powerful, open-source browser extension that blocks ads and trackers at the network level. Learn how it protects your privacy, which browsers support it best, and how to use it safely in 2025.
-
58
Hidden Data Trails in Smart TVs
Smart TVs quietly transmit viewing data to advertisers and analytics firms—even when tracking is “disabled.” Learn how major brands collect data, bypass consent, and what you can do to protect your privacy at home.
-
57
How QR Codes Quietly Track You
QR codes quietly track users through hidden parameters, redirects, and session IDs. This article breaks down how the tracking works, what data is collected, and how to protect your privacy when scanning everyday codes.
-
56
The Overlooked Side of Digital Privacy
Physical security is the missing pillar of digital privacy. This article explains how locking down devices, workspaces, and server rooms protects your data long before software defenses come into play.
-
55
Shielding the Signals
Faraday bags offer a practical way to block wireless signals from phones, key fobs, and other devices. This guide explains how they work, when they’re useful, and which features matter most for privacy and security.
-
54
Hardware Keys: The Fastest Upgrade to Your Account Security
Hardware security keys like YubiKey and Titan Key offer strong, phishing-resistant authentication for privacy-focused users. This guide explains how they work, why they matter, and how to set them up for both 2FA and passwordless logins.
-
53
Privacy in Public Wi-Fi: Beyond VPNs
Public Wi-Fi is convenient but deeply insecure. This article explains why VPNs alone cannot protect you and offers a practical, modern checklist for safeguarding your privacy on shared networks.*The hosts said 2024 but meant 2025.
-
52
Encrypted External Drives: What You Need to Know
A practical guide to choosing between hardware- and software-encrypted external drives and USBs, with expert tips, setup steps, and product recommendations for stronger digital privacy and data protection.
-
51
Sandboxing Apps for Safer Browsing
Sandboxing creates an isolated environment for safer browsing, preventing malware and scripts from accessing your system. This guide explains how sandboxing works, why it matters, and which tools offer the strongest protections for everyday users.
-
50
Home Routers as the Weakest Link
Home routers are often the most vulnerable device in a household network. This article explains why attackers target them, how exploits work, and what steps users should take to protect their homes from router-based intrusions.
-
49
The Rise of Encrypted Search Engines
Encrypted search engines are rising fast as users push back against data-hungry platforms. This article explains why they matter, how they work, and how to choose the right privacy-focused search tool for your daily browsing.
-
48
Password Managers Under the Microscope
A clear-eyed look at password managers in 2025: how they work, where they fail, and what you can do to choose and secure the right tool. This analysis cuts through marketing claims with practical guidance and vetted research.
-
47
The Hidden Costs of “Free” VPNs
Many “free” VPNs hide costs in the form of data harvesting, tracking, and weak security. This article explains the risks, how free VPNs actually make money, and what privacy-focused alternatives offer safer protection.
-
46
Network Isolation for Smart Devices
Learn why isolating smart home devices on a separate network protects your privacy and reduces risk. This guide explains how network segmentation works, why it matters, and how to set up an IoT-only Wi-Fi network for better home security.
-
45
Hardware Firewalls vs. Software Firewalls
A clear guide to how hardware and software firewalls differ, why both matter for digital privacy, and how to build a practical layered defense for your home or workplace.
-
44
What Is SIEM?
A clear explanation of what SIEM is, how it protects privacy and security, and which tools to consider. Learn how SIEM works, why it matters, and what steps to take before deploying one in your organization.
-
43
Disposable Email Domains: A Double-Edged Sword
Disposable email domains boost privacy and reduce spam, but they can also break account recovery and trigger platform blocks. Learn when DEAs help, when they hurt, and how to choose safer alternatives without sacrificing privacy.
-
42
What is GDPR?
A clear, practical breakdown of the EU’s GDPR law, what it requires, who it applies to, and how it affects your privacy and security. Learn the key rights, responsibilities, and steps organizations must take to stay compliant.
-
41
When Apps Watch You Without Wi-Fi
Apps track you offline using Bluetooth beacons, device IDs, and data brokers that merge online and offline behavior. Learn how this works, why it matters, and the steps you can take to minimize it.
-
40
Browser Fingerprinting: The Silent Identifier
Browser fingerprinting quietly tracks you across the web even when cookies fail, using the unique combination of settings and characteristics your device reveals. It’s one of the most persistent and least understood privacy threats online today.
-
39
Set-It-and-Forget-It Updates
Tools like Ninite automate app updates, reducing security risks and eliminating shady bundled installers. This guide explains how automated updaters work, why they matter for privacy and security, and how to start using them safely.
-
38
Enterprise Risk Management, Explained
Enterprise Risk Management (ERM) is a structured way organizations identify, assess, and manage risks across every part of the business. In a world where privacy, cybersecurity, and data protection threats evolve daily, ERM helps organizations stay secure, compliant, and resilient.
-
37
The Cost of Convenience
Submitting IDs or biometric data to social media platforms exposes you to long-term privacy risks, data retention concerns, and potential misuse. Learn how these systems work, what risks they pose, and smarter ways to protect your identity online.
-
36
What is IPv6?
IPv6 is the next-generation Internet Protocol offering more addresses, better efficiency, and new privacy implications. This article explains how IPv6 works, what risks users should understand, and how to evaluate whether your configuration protects your data.
-
35
Decentralized Social Networks: Privacy or Illusion?
Decentralized social networks promise freedom from corporate control, but they aren’t inherently private. This article explores their benefits, risks, and practical steps to stay safe while using federated platforms.
-
34
Local-Only AI: Keeping Your Data Off the Cloud
Local-only AI keeps your data on devices you control instead of sending it to the cloud. Learn why this approach boosts privacy, reduces exposure to third-party risks, and offers a practical path to secure, self-hosted AI.
-
33
The Hidden Risks of Wearable Tech
Wearable tech delivers convenience but exposes deeply personal biometric data. This podcast breaks down the privacy risks, security gaps, and practical steps users can take to protect themselves.
-
32
Block Ads, Boost Privacy: Why You Should Self-Host a Pi-hole
Learn how to self-host a Pi-hole to block ads and trackers across your entire network. Discover setup steps, privacy benefits, and key tips to safeguard your digital life with this open-source network-wide ad blocker.
We're indexing this podcast's transcripts for the first time — this can take a minute or two. We'll show results as soon as they're ready.
No matches for "" in this podcast's transcripts.
No topics indexed yet for this podcast.
Loading reviews...
ABOUT THIS SHOW
Your source for digital privacy news, security tips, and reviews of tools that help you protect your data online.
HOSTED BY
Omar Torres
CATEGORIES
Loading similar podcasts...